-
2
-
-
0035330787
-
Digital steganography: Hiding data within data
-
DOI 10.1109/4236.935180
-
D. Artz Digital steganographic: hiding data within data IEEE Internet Computing 5 2001 75 80 (Pubitemid 32534616)
-
(2001)
IEEE Internet Computing
, vol.5
, Issue.3
, pp. 75-80
-
-
Artz, D.1
-
4
-
-
0346216907
-
Hiding data in images by simple LSB substitution
-
C.K. Chan, and L.M. Chen Hiding data in images by simple LSB substitution Pattern Recognition 37 3 2004 469 474
-
(2004)
Pattern Recognition
, vol.37
, Issue.3
, pp. 469-474
-
-
Chan, C.K.1
Chen, L.M.2
-
5
-
-
4544351078
-
A steganographic method for digital images using side match
-
C.C. Chang, and H.W. Tseng A steganographic method for digital images using side match Pattern Recognition Letters 25 12 2004 1431 1437
-
(2004)
Pattern Recognition Letters
, vol.25
, Issue.12
, pp. 1431-1437
-
-
Chang, C.C.1
Tseng, H.W.2
-
6
-
-
0036497685
-
A steganographic method based upon JPEG and quantization table modification
-
C.C. Chang, T.S. Chen, and L.Z. Chung A steganographic method based upon JPEG and quantization table modification Information Sciences 141 1 2002 123 138
-
(2002)
Information Sciences
, vol.141
, Issue.1
, pp. 123-138
-
-
Chang, C.C.1
Chen, T.S.2
Chung, L.Z.3
-
7
-
-
0032666176
-
Dynamical cryptography based on synchronized chaotic systems
-
Y.H. Chu, and S. Chang Dynamical cryptography based on synchronized chaotic systems IEE Electronics Letters 35 12 1999 974 975
-
(1999)
IEE Electronics Letters
, vol.35
, Issue.12
, pp. 974-975
-
-
Chu, Y.H.1
Chang, S.2
-
9
-
-
0031331952
-
Data encryption: A non-mathematical approach
-
H.J. Highland Data encryption: a non-mathematical approach Computers and Security 16 1997 369 386
-
(1997)
Computers and Security
, vol.16
, pp. 369-386
-
-
Highland, H.J.1
-
10
-
-
33847697308
-
Steganalysis of embedding in two least-significant bits
-
DOI 10.1109/TIFS.2006.890519
-
A.D. Ker Steganalysis of embedding in two least-significant bits IEEE Transactions on Information Forensics and Security 2 1 2007 46 54 (Pubitemid 46375830)
-
(2007)
IEEE Transactions on Information Forensics and Security
, vol.2
, Issue.1
, pp. 46-54
-
-
Ker, A.D.1
-
12
-
-
59149086522
-
A generalization of LSB matching
-
X. Li, B. Yang, D.F. Cheng, and T.Y. Zeng A generalization of LSB matching IEEE Signal Processing Letter 16 2 2009 69 72
-
(2009)
IEEE Signal Processing Letter
, vol.16
, Issue.2
, pp. 69-72
-
-
Li, X.1
Yang, B.2
Cheng, D.F.3
Zeng, T.Y.4
-
13
-
-
48249093845
-
Generalizations of pixel-value differencing steganography for data hiding in images
-
J.C. Liu, and M.H. Shih Generalizations of pixel-value differencing steganography for data hiding in images Fundamenta Informaticae 83 3 2008 319 335
-
(2008)
Fundamenta Informaticae
, vol.83
, Issue.3
, pp. 319-335
-
-
Liu, J.C.1
Shih, M.H.2
-
14
-
-
35848929919
-
A high quality steganographic method with pixel-value differencing and modulus function
-
C.M. Wang, N.I. Wu, C.S. Tsai, and M.S. Hwang A high quality steganographic method with pixel-value differencing and modulus function Journal of Systems and Software 81 1 2008 150 158
-
(2008)
Journal of Systems and Software
, vol.81
, Issue.1
, pp. 150-158
-
-
Wang, C.M.1
Wu, N.I.2
Tsai, C.S.3
Hwang, M.S.4
-
15
-
-
0037410595
-
A steganographic method for images by pixel-value differencing
-
D.C. Wu, and W.H. Tsai A steganographic method for images by pixel-value differencing Pattern Recognition Letters 24 2003 9-10, 1613-1626
-
(2003)
Pattern Recognition Letters
, vol.24
-
-
Wu, D.C.1
Tsai, W.H.2
-
16
-
-
27144475598
-
Image steganographic scheme based on pixel-value differencing and LSB replacement methods
-
H.C. Wu, N.I. Wu, C.S. Tsai, and M.S. Hwang Image steganographic scheme based on pixel-value differencing and LSB replacement methods IEE Proceedings-Vision Image and Signal Processing 152 5 2005 611 615
-
(2005)
IEE Proceedings-Vision Image and Signal Processing
, vol.152
, Issue.5
, pp. 611-615
-
-
Wu, H.C.1
Wu, N.I.2
Tsai, C.S.3
Hwang, M.S.4
-
17
-
-
42749096863
-
Inverted pattern approach to improve image quality of information hiding by LSB substitution
-
C.H. Yang Inverted pattern approach to improve image quality of information hiding by LSB substitution Pattern Recognition 41 8 2008 2674 2683
-
(2008)
Pattern Recognition
, vol.41
, Issue.8
, pp. 2674-2683
-
-
Yang, C.H.1
-
18
-
-
84993973063
-
Weighted bipartite graph for locating optimal LSB substitution for secret embedding
-
C.H. Yang, and S.J. Wang Weighted bipartite graph for locating optimal LSB substitution for secret embedding Journal of Discrete Mathematical Sciences & Cryptography 9 1 2006 153 164 (Taru Publications, India)
-
(2006)
Journal of Discrete Mathematical Sciences & Cryptography
, vol.9
, Issue.1
, pp. 153-164
-
-
Yang, C.H.1
Wang, S.J.2
-
20
-
-
79751527439
-
Information hiding technique based on blocked PVD
-
C.H. Yang, S.J. Wang, C.Y. Weng, and H.M. Sun Information hiding technique based on blocked PVD Journal of Information Management 15 3 2008 29 48
-
(2008)
Journal of Information Management
, vol.15
, Issue.3
, pp. 29-48
-
-
Yang, C.H.1
Wang, S.J.2
Weng, C.Y.3
Sun, H.M.4
-
21
-
-
13644262818
-
Hiding secret data in images via predictive coding
-
Y.H. Yu, C.C. Chang, and Y.C. Hu Hiding secret data in images via predictive coding Pattern Recognition 38 5 2005 691 705
-
(2005)
Pattern Recognition
, vol.38
, Issue.5
, pp. 691-705
-
-
Yu, Y.H.1
Chang, C.C.2
Hu, Y.C.3
|